Blog Posts Tagged with "malware"

296634767383f056e82787fcb3b94864

Flipping Malware: A Profit Opportunity for Corporate IT Departments

December 09, 2012 Added by:Jeffrey Carr

Some of the more forward-looking DOD contractors who have robust internal CERT with engineers who do reverse-engineering could be in the best position to offer free or low-cost network defense to corporations who want to "flip" the malware found on their network for a nice profit...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Japan Aerospace Exploration Agency hit again by malware

December 03, 2012 Added by:Pierluigi Paganini

The New Your Times has recently published the news the Japan Aerospace Exploration Agency was hit by a virus that stolen secret information on newest rockets from an internal computer...

Comments  (0)

Af9c34417f8e5e0d240850bb353b5d40

Lack of Security in Android Apps? That Could Be

December 02, 2012 Added by:Keith Mendoza

Have you ever installed an app in your Android phone and when you got to the permission screen you just couldn't justify to yourself why an app would require the permissions it's asking for?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

W32.Narilam, the malware that hit databases in Middle East

November 25, 2012 Added by:Pierluigi Paganini

W32.Narilam is a worm that attempts to spread by copying itself to all drives and certain shared folders on the compromised computer, the malware doesn’t include modules to steal information from the victims....

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

F-Secure Mobile threat report Q3/2012, cyber threats in the ether

November 06, 2012 Added by:Pierluigi Paganini

The rapid diffusion of Android devices has had the effect of increasing the number of malware developed for the OS. During the third quarter 51,447 unique samples were detected. Google has tried to secure it’s OS with the introduction of an additional security layer named Bouncer...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

TrendMicro Q3 Security Report

October 24, 2012 Added by:Pierluigi Paganini

Trend Micro has released the 3Q 2012 SECURITY ROUNDUP that presents a worrying trend for malware growth which increased 483%. This includes cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Flame, miniFlame, the mystery of an on going cyber espionage campaign

October 16, 2012 Added by:Pierluigi Paganini

Last May The Iranian Computer Emergency Response Team (MAHER) detected a new malware which hit the country named Flame, also known as Flamer or Skywiper. Kaspersky Lab and CrySyS Lab also identified the malware, recognized as a powerful cyber espionage tool that hit mainly Windows systems in the Middle East...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Hacktivists Using Shortened Links to Hide Malware Servers

October 15, 2012 Added by:Dan Dieterle

“Most did not recognise that people using fake profiles, perhaps masquerading as school friends, could capture information and movements. Few consider the possibilities of data mining and how patterns of behaviour can be identified over time..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

What is the Dorkbot Worm That is Attacking Skype Users?

October 12, 2012 Added by:Pierluigi Paganini

What would happen if a malware compromises a communication system adopted daily by 663 million users? Security experts have issued an alert to Skype users about an ongoing attack that tries to induce them to click a link that spreads malware...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Ask The Experts: Workstation Malware

October 04, 2012 Added by:Brent Huston

Once we’ve embraced the fact that we need better detection and response mechanisms, we start to see how honeypots can help us but also how creating better awareness within our users can be the greatest investment an organization might make in detection...

Comments  (0)

37d5f81e2277051bc17116221040d51c

No Surprise - Ransomware On the Rise

October 04, 2012 Added by:Robert Siciliano

Data can sometimes be held hostage with the help of ransomware, software that infiltrates your com­puter when you download an infected attachment or clicking a link within the body of an email. You can also get ransomware simply by visiting the wrong website, in what is called a drive-by...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Correlating and Escalating Cyber

October 02, 2012 Added by:Don Eijndhoven

So here we have a rather clear-cut case of attacker correlation which, as ever, is done pretty much after the fact by an international firm who investigated the malware. My question is: How do you deal with this as a nation, as it happens?

Comments  (7)

70830de61015ee5312d58e6a9e0254ae

We're Under Cyber Attack INSIDE America!

October 01, 2012 Added by:Doug DePeppe

Cyberattacks are mounting. They are getting more severe, and indicate nation-state support, reportedly from Iran. The US national strategy must change. It must address the need for capability where harm from an attack on critical infrastructure will be felt in communities across America...

Comments  (4)

7fef78c47060974e0b8392e305f0daf0

Cyberwar, Cyberdouchery, and Where the Rubber Meets the CyberRoad

October 01, 2012 Added by:Infosec Island Admin

The cyberwar is upon us and we had best start taking it seriously because people in power are making plans, and like biological warfare, it seems perhaps there could be unforeseen circumstances that could trigger bigger and worse things. Plan accordingly and think a bit more cogently...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

PlaceRaider: 3D Visual Malware from Military Research

October 01, 2012 Added by:Pierluigi Paganini

It's known that military sector represents a privileged incubator for new technologies than in many cases are subsequently used in civil. We have already read about the existence of software to spy on victims that are able to record communications and movements but the Naval Surface Warfare Center in Crane, Indiana in collaboration with researchers at Indiana University created a new type of 'vi...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Energy Sector Cyber Espionage: Chinese Hackers are not Alone

September 29, 2012 Added by:Pierluigi Paganini

Since last month a new campaign of cyber attacks have hit the Energy sector, all is started with the incidents to Saudi Aramco and RasGas companies, in both cases a malware infected internal networks without impacting on the production systems...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »